“…IDSs monitor the activity of the network with the purpose of identifying intrusive events and can take actions to abort these risky events. A wide range of techniques have been used to build IDSs, most of the reported and described in previous surveys [2], [3], [4], [5], [6], [7], [8], [9], [10], [11], [12], [13], [14], [15].…”